6251808272-176_200

Descrição

6251808272-176_200
Not/Applicable
Quiz por Not/Applicable, atualizado more than 1 year ago
Not/Applicable
Criado por Not/Applicable quase 10 anos atrás
14
0

Resumo de Recurso

Questão 1

Questão
A vulnerability assessment indicates that a router can be accessed from default port 80 and default port 22. Which of the following should be executed on the router to prevent access via these ports? (Select TWO).
Responda
  • FTP service should be disabled
  • HTTPS service should be disabled
  • SSH service should be disabled
  • HTTP service should disabled
  • Telnet service should be disabled

Questão 2

Questão
Results from a vulnerability analysis indicate that all enabled virtual terminals on a router can be accessed using the same password. The company's network device security policy mandates that at least one virtual terminal have a different password than the other virtual terminals. Which of the following sets of commands would meet this requirement?
Responda
  • line vty 0 6 P@s5W0Rd password line vty 7 Qwer++!Y password
  • line console 0 password password line vty 0 4 password P@s5W0Rd
  • line vty 0 3 password Qwer++!Y line vty 4 password P@s5W0Rd
  • line vty 0 3 password Qwer++!Y line console 0 password P@s5W0Rd

Questão 3

Questão
Joe, an employee, was escorted from the company premises due to suspicion of revealing trade secrets to a competitor. Joe had already been working for two hours before leaving the premises. A security technician was asked to prepare a report of files that had changed since last night's integrity scan. Which of the following could the technician use to prepare the report? (Select TWO).
Responda
  • PGP
  • MD5
  • ECC
  • AES
  • Blowfish
  • HMAC

Questão 4

Questão
Ann has read and write access to an employee database, while Joe has only read access. Ann is leaving for a conference. Which of the following types of authorization could be utilized to trigger write access for Joe when Ann is absent?
Responda
  • Mandatory access control
  • Role-based access control
  • Discretionary access control
  • Rule-based access control

Questão 5

Questão
Human Resources suspects an employee is accessing the employee salary database. The administrator is asked to find out who it is. In order to complete this task, which of the following is a security control that should be in place?
Responda
  • Shared accounts should be prohibited.
  • Account lockout should be enabled
  • Privileges should be assigned to groups rather than individuals
  • Time of day restrictions should be in use

Questão 6

Questão
An administrator finds that non-production servers are being frequently compromised, production servers are rebooting at unplanned times and kernel versions are several releases behind the version with all current security fixes. Which of the following should the administrator implement?
Responda
  • Snapshots
  • Sandboxing
  • Patch management
  • Intrusion detection system

Questão 7

Questão
An auditor's report discovered several accounts with no activity for over 60 days. The accounts were later identified as contractors' accounts who would be returning in three months and would need to resume the activities. Which of the following would mitigate and secure the auditors finding?
Responda
  • Disable unnecessary contractor accounts and inform the auditor of the update.
  • Reset contractor accounts and inform the auditor of the update.
  • Inform the auditor that the accounts belong to the contractors.
  • Delete contractor accounts and inform the auditor of the update.

Questão 8

Questão
Ann, the security administrator, wishes to implement multifactor security. Which of the following should be implemented in order to compliment password usage and smart cards?
Responda
  • Hard tokens
  • Fingerprint readers
  • Swipe badge readers
  • Passphrases

Questão 9

Questão
Customers' credit card information was stolen from a popular video streaming company. A security consultant determined that the information was stolen, while in transit, from the gaming consoles of a particular vendor. Which of the following methods should the company consider to secure this data in the future?
Responda
  • Application firewalls
  • Manual updates
  • Firmware version control
  • Encrypted TCP wrappers

Questão 10

Questão
A new intern was assigned to the system engineering department, which consists of the system architect and system software developer's teams. These two teams have separate privileges. The intern requires privileges to view the system architectural drawings and comment on some software development projects. Which of the following methods should the system administrator implement?
Responda
  • Group based privileges
  • Generic account prohibition
  • User access review
  • Credential management

Questão 11

Questão
One of the system administrators at a company is assigned to maintain a secure computer lab. The administrator has rights to configure machines, install software, and perform user account maintenance. However, the administrator cannot add new computers to the domain, because that requires authorization from the Information Assurance Officer. This is an example of which of the following?
Responda
  • Mandatory access
  • Rule-based access control
  • Least privilege
  • Job rotation

Questão 12

Questão
A small business needs to incorporate fault tolerance into their infrastructure to increase data availability. Which of the following options would be the BEST solution at a minimal cost?
Responda
  • Clustering
  • Mirrored server
  • RAID
  • Tape backup

Questão 13

Questão
A new application needs to be deployed on a virtual server. The virtual server hosts a SQL server that is used by several employees. Which of the following is the BEST approach for implementation of the new application on the virtual server?
Responda
  • Take a snapshot of the virtual server after installing the new application and store the snapshot in a secure location.
  • Generate a baseline report detailing all installed applications on the virtualized server after installing the new application.
  • Take a snapshot of the virtual server before installing the new application and store the snapshot in a secure location.
  • Create an exact copy of the virtual server and store the copy on an external hard drive after installing the new application.

Questão 14

Questão
Ann wants to send a file to Joe using PKI. Which of the following should Ann use in order to sign the file?
Responda
  • Joe's public key
  • Joe's private key
  • Ann's public key
  • Ann's private key

Questão 15

Questão
Which of the following protocols is used to validate whether trust is in place and accurate by returning responses of either "good", "unknown", or "revoked"?
Responda
  • CRL
  • PKI
  • OCSP
  • RA

Questão 16

Questão
During a recent investigation, an auditor discovered that an engineer's compromised workstation was being used to connect to SCADA systems while the engineer was not logged in. The engineer is responsible for administering the SCADA systems and cannot be blocked from connecting to them. The SCADA systems cannot be modified without vendor approval which requires months of testing. Which of the following is MOST likely to protect the SCADA systems from misuse?
Responda
  • Update anti-virus definitions on SCADA systems
  • Audit accounts on the SCADA systems
  • Install a firewall on the SCADA network
  • Deploy NIPS at the edge of the SCADA network

Questão 17

Questão
A security administrator must implement a network authentication solution which will ensure encryption of user credentials when users enter their username and password to authenticate to the network. Which of the following should the administrator implement?
Responda
  • WPA2 over EAP-TTLS
  • WPA-PSK
  • WPA2 with WPS
  • WEP over EAP-PEAP

Questão 18

Questão
Several employees have been printing files that include personally identifiable information of customers. Auditors have raised concerns about the destruction of these hard copies after they are created, and management has decided the best way to address this concern is by preventing these files from being printed. Which of the following would be the BEST control to implement?
Responda
  • File encryption
  • Printer hardening
  • Clean desk policies
  • Data loss prevention

Questão 19

Questão
The company's sales team plans to work late to provide the Chief Executive Officer (CEO) with a special report of sales before the quarter ends. After working for several hours, the team finds they cannot save or print the reports. Which of the following controls is preventing them from completing their work?
Responda
  • Discretionary access control
  • Role-based access control
  • Time of Day access control
  • Mandatory access control

Questão 20

Questão
A security engineer is asked by the company's development team to recommend the most secure method for password storage. Which of the following provide the BEST protection against brute forcing stored passwords? (Select TWO).
Responda
  • PBKDF2
  • MD5
  • SHA2
  • Bcrypt
  • AES
  • CHAP

Questão 21

Questão
After entering the following information into a SOHO wireless router, a mobile device's user reports being unable to connect to the network: PERMIT 0A: D1: FA. B1: 03: 37 DENY 01: 33: 7F: AB: 10: AB Which of the following is preventing the device from connecting?
Responda
  • WPA2-PSK requires a supplicant on the mobile device.
  • Hardware address filtering is blocking the device.
  • TCP/IP Port filtering has been implemented on the SOHO router.
  • IP address filtering has disabled the device from connecting.

Questão 22

Questão
The call center supervisor has reported that many employees have been playing preinstalled games on company computers and this is reducing productivity. Which of the following would be MOST effective for preventing this behavior?
Responda
  • Acceptable use policies
  • Host-based firewalls
  • Content inspection
  • Application whitelisting

Questão 23

Questão
When creating a public / private key pair, for which of the following ciphers would a user need to specify the key strength?
Responda
  • SHA
  • AES
  • DES
  • RSA

Questão 24

Questão
A company has decided to move large data sets to a cloud provider in order to limit the costs of new infrastructure. Some of the data is sensitive and the Chief Information Officer wants to make sure both parties have a clear understanding of the controls needed to protect the data. Which of the following types of interoperability agreement is this?
Responda
  • ISA
  • MOU
  • SLA
  • BPA

Questão 25

Questão
Which of the following solutions provides the most flexibility when testing new security controls prior to implementation?
Responda
  • Trusted OS
  • Host software baselining
  • OS hardening
  • Virtualization

Semelhante

Aprenda a fazer uma boa Redação em 5 passos
Alessandra S.
Como Estudar Matemática
Alessandra S.
Simulado História
Marina Faria
REAÇÕES QUÍMICAS
alessandra
Arte do Renascimento Séc.XV - XVI
paulaqueiroz
Mapa Mental - Como Criar um Mapa Mental
frcristina
Direito Constitucional e Administrativo
Maria José
Plano de Aula em 5 minutos
GoConqr suporte .
SmartStudy Flash Cards - Estrutura do Sistema Financeiro Nacional
Jáder da Mota Mendonça
DESENVOLVIMENTO EMBRIONÁRIO
Vanessa Palauro
PLANEJAMENTO DE LÍNGUA PORTUGUESA 2017 - 1ª ETAPA
Adriana Marcia Couto Poletti